218 lines
		
	
	
		
			6.3 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			218 lines
		
	
	
		
			6.3 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| { config, lib, pkgs, ... }:
 | |
| 
 | |
| {
 | |
|   imports = [
 | |
|     ../module/meteocat-exporter.nix
 | |
|     ../module/upc-qaire-exporter.nix
 | |
|     ../module/nix-daemon-exporter.nix
 | |
|   ];
 | |
| 
 | |
|   age.secrets.grafanaJungleRobotPassword = {
 | |
|     file = ../../secrets/jungle-robot-password.age;
 | |
|     owner = "grafana";
 | |
|     mode = "400";
 | |
|   };
 | |
| 
 | |
|   services.grafana = {
 | |
|     enable = true;
 | |
|     settings = {
 | |
|       server = {
 | |
|         domain = "jungle.bsc.es";
 | |
|         root_url = "%(protocol)s://%(domain)s/grafana";
 | |
|         serve_from_sub_path = true;
 | |
|         http_port = 2342;
 | |
|         http_addr = "127.0.0.1";
 | |
|       };
 | |
|       smtp = {
 | |
|         enabled = true;
 | |
|         from_address = "jungle-robot@bsc.es";
 | |
|         user = "jungle-robot";
 | |
|         # Read the password from a file, which is only readable by grafana user
 | |
|         # https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#file-provider
 | |
|         password = "$__file{${config.age.secrets.grafanaJungleRobotPassword.path}}";
 | |
|         host = "mail.bsc.es:465";
 | |
|         startTLS_policy = "NoStartTLS";
 | |
|       };
 | |
|       feature_toggles.publicDashboards = true;
 | |
|       "auth.anonymous".enabled = true;
 | |
|       log.level = "warn";
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   services.prometheus = {
 | |
|     enable = true;
 | |
|     port = 9001;
 | |
|     retentionTime = "5y";
 | |
|     listenAddress = "127.0.0.1";
 | |
|   };
 | |
| 
 | |
|   # We need access to the devices to monitor the disk space
 | |
|   systemd.services.prometheus-node-exporter.serviceConfig.PrivateDevices = lib.mkForce false;
 | |
|   systemd.services.prometheus-node-exporter.serviceConfig.ProtectHome = lib.mkForce "read-only";
 | |
| 
 | |
|   # Credentials for IPMI exporter
 | |
|   age.secrets.ipmiYml = {
 | |
|     file = ../../secrets/ipmi.yml.age;
 | |
|     owner = "ipmi-exporter";
 | |
|   };
 | |
| 
 | |
|   # Create an IPMI group and assign the ipmi0 device
 | |
|   users.groups.ipmi = {};
 | |
|   services.udev.extraRules = ''
 | |
|     SUBSYSTEM=="ipmi", KERNEL=="ipmi0", GROUP="ipmi", MODE="0660"
 | |
|   '';
 | |
| 
 | |
|   # Add a new ipmi-exporter user that can read the ipmi0 device
 | |
|   users.users.ipmi-exporter = {
 | |
|     isSystemUser = true;
 | |
|     group = "ipmi";
 | |
|   };
 | |
| 
 | |
|   # Disable dynamic user so we have the ipmi-exporter user available for the credentials
 | |
|   systemd.services.prometheus-ipmi-exporter.serviceConfig = {
 | |
|     DynamicUser = lib.mkForce false;
 | |
|     PrivateDevices = lib.mkForce false;
 | |
|     User = lib.mkForce "ipmi-exporter";
 | |
|     Group = lib.mkForce "ipmi";
 | |
|     RestrictNamespaces = lib.mkForce false;
 | |
|     # Fake uid to 0 so it shuts up
 | |
|     ExecStart = let
 | |
|       cfg = config.services.prometheus.exporters.ipmi;
 | |
|     in lib.mkForce (lib.concatStringsSep " " ([
 | |
|       "${pkgs.util-linux}/bin/unshare --map-user 0"
 | |
|       "${pkgs.prometheus-ipmi-exporter}/bin/ipmi_exporter"
 | |
|       "--web.listen-address ${cfg.listenAddress}:${toString cfg.port}"
 | |
|       "--config.file ${lib.escapeShellArg cfg.configFile}"
 | |
|     ] ++ cfg.extraFlags));
 | |
|   };
 | |
| 
 | |
|   services.prometheus = {
 | |
|     exporters = {
 | |
|       ipmi = {
 | |
|         enable = true;
 | |
|         configFile = config.age.secrets.ipmiYml.path;
 | |
|         #extraFlags = [ "--log.level=debug" ];
 | |
|         listenAddress = "127.0.0.1";
 | |
|       };
 | |
|       node = {
 | |
|         enable = true;
 | |
|         enabledCollectors = [ "logind" ];
 | |
|         port = 9002;
 | |
|         listenAddress = "127.0.0.1";
 | |
|       };
 | |
|       blackbox = {
 | |
|         enable = true;
 | |
|         listenAddress = "127.0.0.1";
 | |
|         configFile = ./blackbox.yml;
 | |
|       };
 | |
|     };
 | |
| 
 | |
|     scrapeConfigs = [
 | |
|       {
 | |
|         job_name = "local";
 | |
|         static_configs = [{
 | |
|           targets = [
 | |
|             "127.0.0.1:9002" # Node exporter
 | |
|             #"127.0.0.1:9115" # Blackbox exporter
 | |
|             "127.0.0.1:9290" # IPMI exporter for local node
 | |
|             "127.0.0.1:9928" # UPC Qaire custom exporter
 | |
|             "127.0.0.1:9929" # Meteocat custom exporter
 | |
|             "127.0.0.1:9999" # Nix-daemon custom exporter
 | |
|           ];
 | |
|         }];
 | |
|       }
 | |
|       {
 | |
|         job_name = "blackbox-http";
 | |
|         metrics_path = "/probe";
 | |
|         params = { module = [ "http_2xx" ]; };
 | |
|         static_configs = [{
 | |
|           targets = [
 | |
|             "https://www.google.com/robots.txt"
 | |
|             "https://pm.bsc.es/"
 | |
|             "https://pm.bsc.es/gitlab/"
 | |
|             "https://jungle.bsc.es/"
 | |
|             "https://gitlab.bsc.es/"
 | |
|           ];
 | |
|         }];
 | |
|         relabel_configs = [
 | |
|           {
 | |
|             # Takes the address and sets it in the "target=<xyz>" URL parameter
 | |
|             source_labels = [ "__address__" ];
 | |
|             target_label = "__param_target";
 | |
|           }
 | |
|           {
 | |
|             # Sets the "instance" label with the remote host we are querying
 | |
|             source_labels = [ "__param_target" ];
 | |
|             target_label = "instance";
 | |
|           }
 | |
|           {
 | |
|             # Shows the host target address instead of the blackbox address
 | |
|             target_label = "__address__";
 | |
|             replacement = "127.0.0.1:9115";
 | |
|           }
 | |
|         ];
 | |
|       }
 | |
|       {
 | |
|         job_name = "blackbox-icmp";
 | |
|         metrics_path = "/probe";
 | |
|         params = { module = [ "icmp" ]; };
 | |
|         static_configs = [{
 | |
|           targets = [
 | |
|             "1.1.1.1"
 | |
|             "8.8.8.8"
 | |
|             "ssfhead"
 | |
|             "raccoon"
 | |
|             "anella-bsc.cesca.cat"
 | |
|             "upc-anella.cesca.cat"
 | |
|             "fox.ac.upc.edu"
 | |
|             "fox-ipmi.ac.upc.edu"
 | |
|             "arenys5.ac.upc.edu"
 | |
|             "arenys0-2.ac.upc.edu"
 | |
|             "epi01.bsc.es"
 | |
|             "axle.bsc.es"
 | |
|           ];
 | |
|         }];
 | |
|         relabel_configs = [
 | |
|           {
 | |
|             # Takes the address and sets it in the "target=<xyz>" URL parameter
 | |
|             source_labels = [ "__address__" ];
 | |
|             target_label = "__param_target";
 | |
|           }
 | |
|           {
 | |
|             # Sets the "instance" label with the remote host we are querying
 | |
|             source_labels = [ "__param_target" ];
 | |
|             target_label = "instance";
 | |
|           }
 | |
|           {
 | |
|             # Shows the host target address instead of the blackbox address
 | |
|             target_label = "__address__";
 | |
|             replacement = "127.0.0.1:9115";
 | |
|           }
 | |
|         ];
 | |
|       }
 | |
|       {
 | |
|         job_name = "ipmi-raccoon";
 | |
|         metrics_path = "/ipmi";
 | |
|         static_configs = [
 | |
|           { targets = [ "127.0.0.1:9290" ]; }
 | |
|         ];
 | |
|         params = {
 | |
|           target = [ "raccoon-ipmi" ];
 | |
|           module = [ "raccoon" ];
 | |
|         };
 | |
|       }
 | |
|       {
 | |
|         job_name = "ipmi-fox";
 | |
|         metrics_path = "/ipmi";
 | |
|         static_configs = [
 | |
|           { targets = [ "127.0.0.1:9290" ]; }
 | |
|         ];
 | |
|         params = {
 | |
|           target = [ "fox-ipmi.ac.upc.edu" ];
 | |
|           module = [ "fox" ];
 | |
|         };
 | |
|       }
 | |
|     ];
 | |
|   };
 | |
| }
 |